Moritz Bartl von Torservers.net über gefährliche Illusionen von Sicherheit und warum das Anonymisierungsnetz Tor zwar keine Wunderwaffe, aber ein Kostentreiber ist.
This is the second Yearbook of The DIGITAL ENLIGHTENMENT FORUM. The Forum aims to provide room for debate on the revolutionary transformations of our technological landscape and their effects on human autonomy, democracy and the rule of law in cyberspace. This volume brings together a number of experts on the topic of user-centric personal data management in the era of personal data monetization. The value of personal data has traditionally been understood in ethical terms as a safeguard for personality rights such as human dignity and privacy. However, we have entered an era where personal data are mined, traded and monetized in the process of creating added value - often in terms of free services including efficient search, support for social networking and personalized communications. This volume investigates whether the economic value of personal data can be realized, without compromising privacy, fairness and contextual integrity. It brings scholars and scientists from the disciplines of computer science, law and social science together with policymakers, engineers and entrepreneurs with practical experience of implementing personal data management.
Der Wiener Kriminalsoziologe Reinhard Kreissl beim heutigen Hearing im EU-Parlament über die NSA-Spionage zur Überschätzung von Überwachung durch die Politik.
R. Dowsley, M. Gabel, K. Yurchenko, and V. Zipf. Proceedings of the 2nd International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'16), (December 2016)
C. Aggarwal, and P. Yu. Privacy-Preserving Data Mining, volume 34 of The Kluwer International Series on Advances in Database Systems, Springer US, (2008)
Y. Elovici, B. Shapira, and A. Maschiach. WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, page 63--70. New York, NY, USA, ACM, (2002)
M. Porter. (2022)cite arxiv:2201.07794Comment: working paper (associated with my data-ethics lecture at the 2021 AMS Short Course on Mathematical and Computational Methods for Complex Social Systems); not yet refereed; private comments and suggestions are appreciated.
O. Kieselmann, N. Kopal, and A. Wacker. 10th DPM International Workshop on Data Privacy Management (DPM 2015), co-located with 20th European Symposium on Research in Computer Security (ESORICS 2015), in Press, Vienna, Austria, (September 2015)
O. Kieselmann, N. Kopal, and A. Wacker. 10th DPM International Workshop on Data Privacy Management (DPM 2015), co-located with 20th European Symposium on Research in Computer Security (ESORICS 2015), page 134--149. Vienna, Austria, (September 2015)
R. Araujo, S. Foulle, and J. Traoré. Frontiers of Electronic Voting, volume 07311 of Dagstuhl Seminar Proceedings, Dagstuhl, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)
T. Hoens, M. Blanton, and N. Chawla. Proceedings of the 2010 IEEE Second International Conference on Social Computing, page 816--825. Washington, DC, USA, IEEE Computer Society, (2010)
S. Kanmani, K. Vinupriya, M. Yamuna, and R. Deepika. International Journal on Recent and Innovation Trends in Computing and Communication, 3 (3):
1425--1427(March 2015)
C. Blackwell. Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, page 45:1--45:4. New York, NY, USA, ACM, (2009)
S. Ortmann, P. Langendörfer, and M. Maaser. Proceedings of the 5th ACM international workshop on Mobility management
and wireless access, page 184--187. Chania, Crete Island, Greece, ACM, (2007)
R. Bhadauria, R. Chaki, N. Chaki, and S. Sanyal. (2011)cite arxiv:1109.5388
Comment: The paper is communicated to the IEEE Communications Surveys and
Tutorials.
N. Dokoohaki, C. Kaleli, H. Polat, and M. Matskin. Social Informatics, volume 6430 of Lecture Notes in Computer Science, Springer, Berlin / Heidelberg, (2010)
A. McDonald, and L. Cranor. Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, page 63--72. New York, NY, USA, ACM, (2010)
M. Bilal, and S. Kang. (April 2017)cite arxiv:1705.00764Comment: This article is accepted for the publication in "Sensors" journal. 29 pages, 15 figures.
M. Bilal, and S. Kang. Sensors, (2017)cite arxiv:1705.00764Comment: This article is accepted for the publication in "Sensors" journal. 29 pages, 15 figures.
Q. Ni, E. Bertino, and J. Lobo. SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies, page 133--142. New York, NY, USA, ACM, (2008)
K. Marky, A. Voit, A. Stöver, K. Kunze, S. Schröder, and M. Mühlhäuser. Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society, New York, NY, USA, Association for Computing Machinery, (2020)